Skip to main navigation
Skip to search
Skip to main content
University of Haifa Home
Update your profile
Home
Researchers
Research units
Research output
Search by expertise, name or affiliation
Cybersecurity Spillovers
Mark Verstraete,
Tal Zarsky
Faculty of Law
Research output
:
Contribution to journal
›
Article
›
peer-review
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Cybersecurity Spillovers'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Analytical Tools
20%
Beneficial Effects
20%
Cloud Service Client
20%
Cloud Services
40%
Cloud Storage
20%
Cloud User
20%
Cybersecurity
100%
Cybersecurity Protection
20%
Indivisibility
20%
Liability Rules
20%
Market Concentration
20%
Market Failure
40%
Market Spillovers
20%
Negative Externalities
40%
Plague
20%
Politicians
40%
Positive Externalities
20%
Procurement Process
20%
Public Cloud
20%
Security Ecosystem
20%
Security Protection
20%
Security Services
20%
Service Firms
20%
Service Procurement
20%
Specific Interventions
20%
Tender Process
20%
Economics, Econometrics and Finance
Cloud Storage
9%
Cybersecurity
100%
Externalities
27%
Market Concentration
9%
Market Failure
18%
Spillover Effect
100%
Social Sciences
Cloud Storage
33%
Externality
100%
Market Failure
66%
Pessimism
33%
Psychology
Pessimism
9%
Spillover Effect
100%